23 computer-security "https:" "https:" "https:" "https:" "https:" "Dr" uni jobs at Nature Careers
Sort by
Refine Your Search
-
researchers for the Canada Impact+ Research Chairs program . This national initiative is designed to recruit world-leading scholars whose work addresses critical global and national challenges and who
-
. On-site secure parking All applications must be made via our website: https://www.crukscotlandinstitute.ac.uk/careers/scientific-officers.html Closing Date: January 30th (applications reviewed on a
-
- Cordova Extension) Online: https://www.uaa.alaska.edu/students/safety . Request a paper copy in person: UAA Police Department Office at Room 114 of Eugene Short Hall on the Anchorage campus / UAA Dean
-
, this position has 30-50% of time dedicated to research. The successful candidate is expected to have a record of securing competitive funding for their research program and will be expected to articulate
-
, and uncrewed aerial systems (https://www.uwyo.edu/soc/index.html . Research Computing & Remote Sensing Resources UW offers exceptional resources for computational and geospatial research, including: A
-
will be withdrawn. Review of Applications Begins On: 01/16/2026 Website: https://www.canr.msu.edu/rdsp/ Reproductive and Developmental Sciences Program (RDSP): Michigan State University boasts a
-
of vertebrate systems is preferred. Research may focus on development of the embryo or a particular organ system. The candidate will be expected to integrate their research program with the mission of the School
-
available through the Office of the Provost and Vice-Principal (Academic): https://www.queensu.ca/provost/queens-national-scholars-program/queens-national-scholars-program-overview Qualifications As a Queen’s
-
information on the Queen’s National Scholar Program can be found on the website of the Office of the Provost and Vice-Principal (Academic): Queen’s National Scholars Program. The successful candidate will join
-
diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular